CVE-2015-2756
Publication date 1 April 2015
Last updated 24 July 2024
Ubuntu priority
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
Status
Package | Ubuntu Release | Status |
---|---|---|
qemu | ||
14.04 LTS trusty |
Fixed 2.0.0+dfsg-2ubuntu1.11
|
|
qemu-kvm | ||
14.04 LTS trusty | Not in release | |
xen | ||
14.04 LTS trusty |
Fixed 4.4.1-0ubuntu0.14.04.5
|
|
xen-3.3 | ||
14.04 LTS trusty | Not in release | |
Notes
smb
This is a qemu change which is part of the xen package for the "traditional" qemu. Trusty and newer only provide qemu traditional as a backup but by default use the generic qemu from the archive and Vivid completely drops qemu traditional. So the non-qemut patches in that XSA need to go into qemu.
Patch details
Package | Patch details |
---|---|
qemu |
References
Related Ubuntu Security Notices (USN)
- USN-2608-1
- QEMU vulnerabilities
- 13 May 2015